Alert Logic vs ExtraHop Reveal(x) comparison

Cancel
You must select at least 2 products to compare!
Alert Logic Logo
183 views|119 comparisons
92% willing to recommend
ExtraHop Networks Logo
3,661 views|2,676 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Alert Logic and ExtraHop Reveal(x) based on real PeerSpot user reviews.

Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management.
To learn more, read our detailed Vulnerability Management Report (Updated: March 2024).
768,857 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable aspect of Alert Logic is its technology platform. They have SOCs in the US and Europe, giving them global visibility of the threat landscape. They detect and respond to threats in minutes. Their biggest value is human expertise. You're being attacked by a human, and you cannot respond to it unless you have a human on the other side. They have the human and technological resources to respond.""While I still have on-premises appliances, I can remotely monitor everything from the cloud, and Alert Logic's ease-of-access features have helped me streamline my workflow and reduce implementation time.""It has the ability to install agents. It is pretty straightforward. You can automate the process pretty easily.""The quicker implementation of changes to our infrastructure from Alert Logic tell us if there are any problems.""We receive infrastructure security warnings from it. So, we know what is going on and what needs to be addressed.""The initial setup is pretty straightforward.""It is a very stable product.""The solution was consistently available, and I cannot recall any instances where it was down."

More Alert Logic Pros →

"ExtraHop Reveal(x) is one of the tools that works out of the box when it comes to threat hunting.""We had useful information within the hour of deployment. The ability to trace back for historical analysis, as well as the behavioral analysis done with the security information, puts the user in a position to make an informed decision to mitigate the performance or security incidents. Regarding the security incidents, Reveal (x) is able to create incident cards that guide your teams through the incidents and gives you the option to delve into the transaction detail to potentially view payloads as well.""The solution's ability to decrypt SSL traffic is its most valuable feature.""The solution works well for sending sensors.""Reveal X integrates seamlessly with CrowdStrike. If you see something sketchy on the network, you can quarantine devices through ExtraHop and it'll push to the CrowdStrike server.""When there are performance issues with an HTTP app, ExtraHop enables us to identify the causes within a few minutes. We can see what transactions are being impacted by something that may be happening within the server environment.""Setting up the solution is relatively easy.""It's a wire analytics tool. We use it for isolating and determining issues on our network or applications. It does a lot for crediting the network as opposed to discrediting the network. A lot of people come along and say that it's a network issue. It's always considered to be a network issue, but by using ExtraHop, we can quickly tell them that it's not a networking issue. It's something to do with your application or something at the other end. It could be a database issue. This tool gives us the ability to pinpoint with great accuracy the comings and goings on our network."

More ExtraHop Reveal(x) Pros →

Cons
"As a user involved with the user interface, I believe there is a need to continue improving it based on feedback from our customers.""Its menu is not very intuitive. I would like to see the user menu expanded a bit. The user menu is very layered, and because of the layers, you have to go down a path that is not very intuitive.""I would like to see it do initial scans and start capturing data, which it will truly analyze, not just be a reporting system saying, "Here is an email. Here is an email. Here is an email."""They have ideas and email you whatever they find, but they don't have a dedicated security team who will work on an attack or a specific security instance.""The documentation, especially with the initial setup, needs improvement.""Could be more of an endpoint protector.""This product needs to mature more. While it is a good product, there are some areas where it needs work.""The setup process was complex."

More Alert Logic Cons →

"There is a little training online, but it'd be cool if ExtraHop provided certifications. CrowdStrike does elective training that gives you a certification as a Falcon administrator. It'd be nice to see ExtraHop have something like that""They used to have the ability to decode Citrix sign-on, setup, and tear down. Unfortunately, Citrix has stopped sharing that knowledge. Citrix has continued to change its model of processing, making it harder and harder to troubleshoot.""It needs integration with more security vendors.""The solution should include more support protocols.""I would like to see more cloud capability.""The solution’s pricing could be improved.""ExtraHop Reveal(x) could improve by allowing a longer look back in the feature. Right now you have a limit of 30 days to look back on your activity. I've used Darktrace before, and they allow you the ability to play back events. This would be a good feature to have in ExtraHop Reveal(x).""Agent management could certainly use some focus. It should also be a little bit easier to work with collections. We should be able to nest collections within collections. There should be better nesting."

More ExtraHop Reveal(x) Cons →

Pricing and Cost Advice
  • "Our ROI would probably be zero. We don't even use it. It sits in there. We get emails and just delete them. Around the world, we don't even use it."
  • "Alert Logic has better competitive pricing than some of its competitors."
  • "Almost any product that is on the AWS Marketplace is super easy to subscribe to."
  • "Its pricing is very reasonable considering what you get for what you pay. There is quite a good value there. Its licensing is also very logical. They've got the licensing price points at a reasonable level. It is on a monthly license but a yearly contract. There are no additional costs to the standard licensing fees."
  • "Price of the solution was very reasonable considering the size of our organization at the time, and so it worked out perfectly."
  • More Alert Logic Pricing and Cost Advice →

  • "I would rate the price a three out of five. It could be less expensive."
  • "I rate ExtraHop Reveal(x) six out of 10 for affordability. We pay for an annual license. It's always one of those trade-offs. You get a lot of value, but ExtraHop isn't exorbitantly priced. You can pay extra for additional features like the ability to decode HL7 traffic, which is crucial for EMR environments."
  • "The solution is based on an annual subscription model and is expensive."
  • "I rate the price of ExtraHop Reveal(x) a seven on a scale of one to ten, where one is a high price, and ten is a low price."
  • More ExtraHop Reveal(x) Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
    768,857 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable aspect of Alert Logic is its technology platform. They have SOCs in the US and Europe, giving them global visibility of the threat landscape. They detect and respond to threats in… more »
    Top Answer:Alert Logic's license is one of the most competitive. They deliver a high-quality service for a competitive price.
    Top Answer:Alert Logic should also develop an EDR that is natively integrated into their solution. Currently, a client must buy another EDR solution like SentinelOne, CrowdStrike, or Sophos. I think Alert Logic… more »
    Top Answer:We just did an assessment for our 47 datacenters around North America. The top two enterprise-level network monitoring solutions were ExtraHop first, Riverbed SteelCenter second. Their negotiated cost… more »
    Top Answer:One I am looking closely at is AppNeta. They have an appliance that can digest the flow and do a better job than Netflow The other one we are using is ExtraHop.  This has both a Datacenter… more »
    Top Answer:With ExtraHop Reveal(x), it gives me more visibility into the packets. It doesn't provide the entire packet capture, but it offers more information on how connections are made at the network layer… more »
    Ranking
    25th
    Views
    183
    Comparisons
    119
    Reviews
    3
    Average Words per Review
    695
    Rating
    8.3
    Views
    3,661
    Comparisons
    2,676
    Reviews
    9
    Average Words per Review
    543
    Rating
    8.6
    Comparisons
    Also Known As
    Alert Logic MDR, Alert Logic Managed Detection and ResponseAlert Logic Threat Manager, Alert Logic Cloud Defender, Critical Watch FusionVM
    Reveal(x), Revealx
    Learn More
    Overview

    Alert Logic is a cloud-based security and compliance solution that provides threat detection and response, log management, and compliance automation. Its primary use case is to manage lag and protect the network, identify configuration issues related to security and cloud infrastructure, and serve as the primary SIEM tool before escalating tickets. 

    The most valuable feature is that it has everything in one dashboard, including being notified of incidents and receiving advice on what steps to take. Alert Logic has helped organizations process large amounts of data, remotely monitor everything from the cloud, and streamline workflow while reducing implementation time.

    ExtraHop Reveal(x) is a highly effective network traffic analysis (NTA) solution that leverages a cloud-native architecture to empower organizations to overcome a world filled with increasingly sophisticated threats. It identifies 25% more threats than its competitors. Additionally, organizations that employ Reveal(x) say they resolve issues 77% percent faster than they would if they were using other similar solutions.

    ExtraHop Reveal(x) Benefits

    Some of the ways that organizations can benefit by choosing to deploy ExtraHop Reveal(x) include:

    • Total network visibility. Reveal(x) gives users the ability to view every component of their network and devices connected to it in real time. It can automatically recognize and classify the devices that are communicating across an organization’s network. These devices are scanned by powerful decryption software that reveals hidden threats and the details of critical transactions without compromising privacy or compliance rules. Organizations are given full East-West visibility across both physical data centers and cloud environments. Threats that are on the periphery are brought to the attention of the administrators tasked with watching out for them.
    • Identify threats in real time. Reveal(x) extracts more than 5,000 features from the L2-L7 security layers at any given time, feeds them into its machine learning engine, and presents them to its rule-based detection feature. These features make it possible for the solution to identify the most severe threats. Users can conduct a threat triage and address the threats that their system detects in the order of severity that these threats represent.
    • Ease of use. Users of Reveal(x) can easily make full use of its event remediation features without expending long periods of time learning them. Its workflows are designed so that administrators can go from a security event to the cause of the event in only a couple of clicks. What would normally take hours can be completed in moments.

    ExtraHop Reveal(x) Features

    • Integration suite. Reveal(x) enables users to utilize a robust suite of integrations. If users feel they are missing important capabilities, they can bolster their security feature toolbox with those offered by third-party solutions. Phantom, Splunk, and Palo Alto are three examples of solutions that Reveal(x) enables users to connect to in order to fill in a gap in their security capabilities.
    • Automated inventory. Reveal(x) automatically creates a detailed inventory of all of the devices that it discovers and classifies. This keeps an always up-to-date record of all of the devices that are communicating in a given network.

    • Machine learning. Reveal(x)’s real-time application analytics is driven by a machine learning engine. It detects anomalies in an organization’s network traffic, thus enabling users to keep ahead of any and all threats while reducing the number of false positives that administrators have to sort through.

    Reviews from Real Users

    ExtraHop Reveal(x) is a solution that stands out when compared to many other similar solutions. Two major advantages that it offers are its versatility and its ability to quickly identify the root cause of an application’s issues.

    John B., the senior monitoring engineer at a financial services firm, says, “It's useful for different teams in our organization. The cybersecurity team uses it because it has got great analytics for anomaly detection, malware detection, and ransomware. It's used by the networking people because it's great to be able to get the three-way handshake between systems to see how your network is doing. The microservices for DNS use it because they like to be able to see how their DNS services are operating and how many DNS requests are being rejected, denied, or dropped. Application people love it because it fully decrypts their traffic.

    Henry S., a systems engineer at LifePoint Health, writes, "When there are performance issues with an HTTP app, ExtraHop enables us to identify the causes within a few minutes. We can see what transactions are being impacted by something that may be happening within the server environment."

    Sample Customers
    TIME, Genome Next, Rentalcargroup.com, Travel Tripper, C&J Energy Services, Investis, Retail Insights
    Wood County Hospital
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm11%
    Healthcare Company8%
    Manufacturing Company7%
    REVIEWERS
    Security Firm22%
    Computer Software Company22%
    Financial Services Firm22%
    Educational Organization11%
    VISITORS READING REVIEWS
    Computer Software Company15%
    Financial Services Firm15%
    Government7%
    Manufacturing Company6%
    Company Size
    REVIEWERS
    Small Business33%
    Midsize Enterprise17%
    Large Enterprise50%
    VISITORS READING REVIEWS
    Small Business30%
    Midsize Enterprise20%
    Large Enterprise50%
    REVIEWERS
    Small Business23%
    Midsize Enterprise23%
    Large Enterprise54%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise14%
    Large Enterprise65%
    Buyer's Guide
    Vulnerability Management
    March 2024
    Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management. Updated: March 2024.
    768,857 professionals have used our research since 2012.

    Alert Logic is ranked 25th in Vulnerability Management with 11 reviews while ExtraHop Reveal(x) is ranked 5th in Network Traffic Analysis (NTA) with 12 reviews. Alert Logic is rated 8.0, while ExtraHop Reveal(x) is rated 8.6. The top reviewer of Alert Logic writes "Great reporting and session logic with an easy initial setup". On the other hand, the top reviewer of ExtraHop Reveal(x) writes "It helps you visualize how data moves across your network". Alert Logic is most compared with CrowdStrike Falcon Complete, Arctic Wolf Managed Detection and Response, Sophos MDR, Rapid7 InsightIDR and SentinelOne Vigilance, whereas ExtraHop Reveal(x) is most compared with Darktrace, Vectra AI, Corelight, Cisco Secure Network Analytics and Arista NDR.

    We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.